The ranch_ssl
module implements an SSL Ranch transport.
| {cacertfile, string()}
| {cacerts, [Der::binary()]}
| {cert, Der::binary()}
| {certfile, string()}
| {ciphers, [ssl:erl_cipher_suite()] | string()}
| {fail_if_no_peer_cert, boolean()}
| {hibernate_after, integer() | undefined}
| {ip, inet:ip_address()}
| {key, Der::binary()}
| {keyfile, string()}
| {next_protocols_advertised, [binary()]}
| {nodelay, boolean()}
| {password, string()}
| {port, inet:port_number()}
| {raw, non_neg_integer(), non_neg_integer(), non_neg_integer() | binary()}
| {reuse_session, fun()}
| {reuse_sessions, boolean()}
| {secure_renegotiate, boolean()}
| {verify, ssl:verify_type()}
| {verify_fun, {fun(), InitialUserState::term()}}]
Listen options.
This does not represent the entirety of the options that can be set on the socket, but only the options that should be set independently of protocol implementation.
Specifying a certificate is mandatory, either through the cert
or the certfile
option. None of the other options are required.
The default value is given next to the option name.
verify_peer
to request a certificate from the client.Note that the client will not send a certificate unless the
value for the verify
option is set to verify_peer
. This
means that the fail_if_no_peer_cert
only apply when combined
with the verify
option. The verify_fun
option allows
greater control over the client certificate validation.
The raw
option is unsupported.
None.